Loading [MathJax]/jax/element/mml/optable/BasicLatin.js
Research article Special Issues

Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems

  • Healthcare industry is one of the promising fields adopting the Internet of Things (IoT) solutions. In this paper, we study secret sharing mechanisms towards resolving privacy and security issues in IoT-based healthcare applications. In particular, we show how multiple sources are possible to share their data amongst a group of participants without revealing their own data to one another as well as the dealer. Only an authorised subset of participants is able to reconstruct the data. A collusion of fewer participants has no better chance of guessing the private data than a non-participant who has no shares at all. To realise this system, we introduce a novel research upon secret sharing in the encrypted domain. In modern healthcare industry, a patientos health record often contains data acquired from various sensor nodes. In order to protect information privacy, the data from sensor nodes is encrypted at once and shared among a number of cloud servers of medical institutions via a gateway device. The complete health record will be retrieved for diagnosis only if the number of presented shares meets the access policy. The retrieval procedure does not involve decryption and therefore the scheme is favourable in some time-sensitive circumstances such as a surgical emergency. We analyse the pros and cons of several possible solutions and develop practical secret sharing schemes for IoT- based healthcare systems.

    Citation: Ching-Chun Chang, Chang-Tsun Li. Algebraic secret sharing using privacy homomorphisms for IoT-basedhealthcare systems[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 3367-3381. doi: 10.3934/mbe.2019168

    Related Papers:

    [1] Weike Zhou, Aili Wang, Fan Xia, Yanni Xiao, Sanyi Tang . Effects of media reporting on mitigating spread of COVID-19 in the early phase of the outbreak. Mathematical Biosciences and Engineering, 2020, 17(3): 2693-2707. doi: 10.3934/mbe.2020147
    [2] Hamdy M. Youssef, Najat A. Alghamdi, Magdy A. Ezzat, Alaa A. El-Bary, Ahmed M. Shawky . A new dynamical modeling SEIR with global analysis applied to the real data of spreading COVID-19 in Saudi Arabia. Mathematical Biosciences and Engineering, 2020, 17(6): 7018-7044. doi: 10.3934/mbe.2020362
    [3] Haonan Zhong, Wendi Wang . Mathematical analysis for COVID-19 resurgence in the contaminated environment. Mathematical Biosciences and Engineering, 2020, 17(6): 6909-6927. doi: 10.3934/mbe.2020357
    [4] Fang Wang, Lianying Cao, Xiaoji Song . Mathematical modeling of mutated COVID-19 transmission with quarantine, isolation and vaccination. Mathematical Biosciences and Engineering, 2022, 19(8): 8035-8056. doi: 10.3934/mbe.2022376
    [5] Pannathon Kreabkhontho, Watchara Teparos, Thitiya Theparod . Potential for eliminating COVID-19 in Thailand through third-dose vaccination: A modeling approach. Mathematical Biosciences and Engineering, 2024, 21(8): 6807-6828. doi: 10.3934/mbe.2024298
    [6] Lin Feng, Ziren Chen, Harold A. Lay Jr., Khaled Furati, Abdul Khaliq . Data driven time-varying SEIR-LSTM/GRU algorithms to track the spread of COVID-19. Mathematical Biosciences and Engineering, 2022, 19(9): 8935-8962. doi: 10.3934/mbe.2022415
    [7] Yujie Sheng, Jing-An Cui, Songbai Guo . The modeling and analysis of the COVID-19 pandemic with vaccination and isolation: a case study of Italy. Mathematical Biosciences and Engineering, 2023, 20(3): 5966-5992. doi: 10.3934/mbe.2023258
    [8] Ahmed Alshehri, Saif Ullah . A numerical study of COVID-19 epidemic model with vaccination and diffusion. Mathematical Biosciences and Engineering, 2023, 20(3): 4643-4672. doi: 10.3934/mbe.2023215
    [9] Dipo Aldila, Meksianis Z. Ndii, Brenda M. Samiadji . Optimal control on COVID-19 eradication program in Indonesia under the effect of community awareness. Mathematical Biosciences and Engineering, 2020, 17(6): 6355-6389. doi: 10.3934/mbe.2020335
    [10] Tianfang Hou, Guijie Lan, Sanling Yuan, Tonghua Zhang . Threshold dynamics of a stochastic SIHR epidemic model of COVID-19 with general population-size dependent contact rate. Mathematical Biosciences and Engineering, 2022, 19(4): 4217-4236. doi: 10.3934/mbe.2022195
  • Healthcare industry is one of the promising fields adopting the Internet of Things (IoT) solutions. In this paper, we study secret sharing mechanisms towards resolving privacy and security issues in IoT-based healthcare applications. In particular, we show how multiple sources are possible to share their data amongst a group of participants without revealing their own data to one another as well as the dealer. Only an authorised subset of participants is able to reconstruct the data. A collusion of fewer participants has no better chance of guessing the private data than a non-participant who has no shares at all. To realise this system, we introduce a novel research upon secret sharing in the encrypted domain. In modern healthcare industry, a patientos health record often contains data acquired from various sensor nodes. In order to protect information privacy, the data from sensor nodes is encrypted at once and shared among a number of cloud servers of medical institutions via a gateway device. The complete health record will be retrieved for diagnosis only if the number of presented shares meets the access policy. The retrieval procedure does not involve decryption and therefore the scheme is favourable in some time-sensitive circumstances such as a surgical emergency. We analyse the pros and cons of several possible solutions and develop practical secret sharing schemes for IoT- based healthcare systems.


    Population dynamics has always been an important research object of biomathematics. Various groups often have complex interspecific relationships, such as predation, competition, parasitism and mutualism [1]. Predation behavior, as a widespread interspecies relationship, has been widely studied. Lotka and Volterra were the first to propose a predator-prey system to describe the widespread interspecies relationship of predation [2]. Holling further proposed three functional responses of predators to describe the energy transfer between predators and prey [3]. These three functional responses have been applied and perfected by many scientists [4]. In 1991, Hastings and Powell proposed a food chain system with chaotic dynamics and studied the dynamics of the model [5]. In recent years, many mathematicians have also studied the development and improvement of Hastings-Powell food chain models [6,7,8,9].

    Fractional calculus is a generalization of traditional calculus, and its order can be composed of integers, fractions or complex numbers[10]. Fractional calculus can better describe some systems or processes with memory and hereditary properties, and it has been widely used in many fields, such as physics, secure communication, system control, neural networks, and chaos[11,12]. The method of solving the fractional model has also been widely studied[13,14]. In [15], the Caputo fractional derivative operator is used instead of the integer first derivative to establish an effective numerical method for solving the dynamics of the reaction-diffusion model based on a new implicit finite difference scheme. In [16], a numerical approximation for the Caputo-Fabrizio derivative is used to study the dynamic complexity of a predator-prey system with a Holling-type functional response. In [17], a new fractional chaotic system described by the Caputo fractional derivative is presented, and how to use the bifurcation diagram of this chaotic system to detect chaotic regions is analyzed. In [18], the generalization of Lyapunov's direct method applying Bihari's and Bellman-Gronwall's inequalities to Caputo-type fractional-order nonlinear systems is proposed. In [19], the Fourier spectral method is introduced to explore the dynamic richness of two-dimensional and three-dimensional fractional reaction-diffusion equations. In [20], the spatial pattern formation of the predator-prey model with different functional responses was studied. [21] studied the numerical solution of the space-time fractional reaction-diffusion problem that simulates the dynamic and complex phenomena of abnormal diffusion.

    Since most biological mathematical models have long-term memory, fractional differential equations can more accurately and reliably describe the actual dynamic process [1,22]. [23] proposed fractional predator-prey models and fractional rabies models and studied their equilibrium points, stability and numerical solutions. In [24], the authors studied the stability of a fractional-order system by the Lyapunov direct method, which substantially developed techniques to study the stability of fractional-order population models. In [9], the authors extended the Hastings-Powell food chain system to fractional order and analyzed its dynamic behavior.

    As an important research object of biological mathematics and control theory, population model control has received extensive research and development in recent years [25,26,27]. In [28], the authors conducted random detection and contacted tracking on the HIV/AIDS epidemic model and used the Adams-type predictor-corrector method to perform fractional optimal control of the model, which significantly reduced the number of AIDS patients and HIV-infected patients. In [29], the authors applied the time-delay feedback controller to the fractional-order competitive Internet model to solve the bifurcation control problem of this model. In [30], the author considered the influence of additional predators on the Hastings-Powell food chain model and studied the control of chaos in this model.

    Biological models are widely studied by scientists, but many classic models study food chain models composed of herbivores and carnivores, and omnivores are rarely considered. In fact, omnivores are widespread in nature and play an important role in the food chain. In this article, the existence of omnivores is fully considered, and a food chain model in which herbivores, omnivores and carnivores coexist is studied. Based on these works, this paper proposes a fractional food chain model with a Holling type-II functional response. The main contributions of this paper are as follows. First, this paper proves the existence and uniqueness of the solution and the nonnegativity and boundedness of the solution. Second, the equilibrium point of the model is calculated, and the local stability of the equilibrium point is proven. Third, a controller is designed to prove the global asymptotic stability of the system by using the Lyapunov method.

    This paper is organized as follows. In Section 2, the definitions and lemmas are given, and the food chain model is established. In Section 3, the existence, uniqueness, nonnegativity and boundedness are proven, and the local stability of the equilibrium point of the model is studied. The global stability of the model is studied through the controller. In Section 4, numerical simulations are performed to verify the theoretical results. The conclusion of this article is given in Section 5.

    In this section, some basic knowledge about fractional equations and the theorems and lemmas used in this paper are given, and the fractional food chain system is introduced.

    Definition 1. [10]. The Caputo fractional derivative of order α of a function f, R+R, is defined by

    Dαtf(t)=1Γ(nα)t0fn(τ)(tτ)α+1ndτ,(n1<α<n), nZ+,

    where Γ() is the Gamma function. When 0<α<1,

    Dαtf(t)=1Γ(1α)t0f(τ)(tτ)αdτ.

    Definition 2. [31]. When the order a>0, for a function f:(0,)R, the Riemann-Liouville representation of the fractional integral operator is defined by

    RLDatf(t)=RLIatf(t)=1Γ(a)t0(tτ)a1f(τ)dτ,t>0,
    RLI0tg(t)=g(t),

    where a>0 and Γ() is the Gamma function.

    Lemma 1. (Generalized Gronwall inequality) [32]. Assume that m0, γ>0, and a(t) are nonnegative, locally integrable, and nondecreasing functions defined on 0tT(T). In addition, h(t) is a nonnegative, locally integrable function defined in 0tT and satisfies

    h(t)a(t)+mt0(ts)γ1h(t)ds,

    then,

    h(t)=a(t)Eγ(mΓ(γ)tγ),

    where the Mittag-Leffler function Eγ(z)=k=0zkΓ(kγ+1).

    Lemma 2. [10]. Consider the fractional-order system

    {Dαtx(t)=f(t,x(t)),x(0)=x0, (2.1)

    where f(t,x(t)) defined in R+×RnRn and α(0,1].

    The local asymptotic stability of the equilibrium point of this system can be derived from |arg(λi)|>απ2, where λi are the eigenvalues of the Jacobian matrix at the equilibrium points.

    Lemma 3. [24]. Consider the system

    {Dαtx(t)=f(t,x(t)),x(0)=xt0, (2.2)

    where α(0,1], f:[t0,)×ΩRn, and ΩRn; if f(t,x) satisfies the local Lipschitz condition about x on [t0,)×Ω, then there exists a unique solution of (2.2).

    Lemma 4. [33]. The function x(t)R+ is continuous and derivable; then, for any tt0

    Dαt[x(t)xxlnx(t)x](1xx(t))Dαtx(t),xR+,α(0,1).

    There are a variety of complex biological relationships in nature. Predation is the most important biological relationship, and it has received attention from and been studied by many scientists. In [5], the author proposed a three-species food chain model. The model consists of one prey ˆX and two predators ˆY and ˆZ. The top predator ˆZ feeds on the secondary predator ˆY, and the secondary predator ˆY feeds on the prey ˆX. This is the famous Hastings-Powell model:

    {dˆXdT=ˆRˆX(1ˆXˆK)^C1^A1ˆXˆY^B1+ˆX,dˆYdT=^A1ˆXˆY^B1+ˆX^A2ˆYˆZ^B2+ˆY^D1ˆY,dˆZdT=^C2^A2ˆYˆZ^B2+ˆY^D2ˆZ, (2.3)

    where ˆR and ˆK represent the intrinsic growth rates and environmental carrying capacity, respectively. For i=1,2, parameters^Ai, ^Bi, ^Ci and ^Di are the predation coefficients, half-saturation constant, food conversion coefficients and death rates.

    The Hastings-Powell model considers a food chain composed of herbivores, small carnivores and large carnivores but does not consider the existence of omnivores. We consider a food chain consisting of small herbivores X, medium omnivores Y and large carnivores Z. Among them, omnivores Y prey on herbivores X, and carnivores Z prey on omnivores Y. They all respond according to Holling II type. This system can be expressed mathematically as

    {dXdT=R1X(1XK1)C1A1XYB1+X,dYdT=R2Y(1YK2)+A1XYB1+XA2YZB2+Y,dZdT=C2A2YZB2+YDZ, (2.4)

    where X, Y and Z represent the densities of the prey population, primary predator population and top-predator population, respectively. For i=1,2, parameters Ri, Ki, Ai, Bi and Ci are the intrinsic growth rates, environmental carrying capacity, predation coefficients, half-saturation constant and food conversion coefficients, respectively. The parameter D is the death rates for Z.

    Then, we obtain the following dimensionless version of the food chain model:

    {dxdt=r1x(1xK1)a1xy1+b1x,dydt=r2y(1yK2)+a1xy1+b1xa2yz1+b2y,dzdt=a2yz1+b2ydz, (2.5)

    the independent variables x, y and z are dimensionless population variables; t represents a dimensionless time variable; and ai, bi(i=1,2) and d are positive.

    Research results show that using fractional derivatives to model real-life biological problems is more accurate than classical derivatives[15]. To better analyze the dynamics between these three populations, we studied the following fractional-order Hastings-Powell System food chain model:

    {Dαtx=r1x(1xK1)a1xy1+b1x,Dαty=r2y(1yK2)+a1xy1+b1xa2yz1+b2y,Dαtz=a2yz1+b2ydz, (2.6)

    where α(0,1) is the fractional order.

    Theorem 1. The fractional-order Hastings-Powell System food chain model (2.6) has a unique solution.

    Proof: We will study the existence and uniqueness of the system (2.6) in [0,T]×Ω, where Ω={(x,y,z)R3:0x,y,zH}. Let S=(x,y,z), ˉS=(ˉx,ˉy,ˉz), F(S)=(F1(S),F2(S),F3(S)) and

    {F1(S)=Dαtx=r1x(1xK1)a1xy1+b1x,F2(S)=Dαty=r2y(1yK2)+a1xy1+b1xa2yz1+b2y,F3(S)=Dαtz=a2yz1+b2ydz, (3.1)

    For any S,ˉSΩ, it follows from (3.1) that

    F(S)F(ˉS)=|F1(S)F1(ˉS)|+|F2(S)F2(ˉS)|+|F3(S)F3(ˉS)|=|r1x(1xK1)a1xy1+b1x(r1ˉx(1ˉxK1)a1ˉxˉy1+b1ˉx)|+|r2y(1yK2)+a1xy1+b1xa2yz1+b2y(r2ˉy(1ˉyK2)+a1ˉxˉy1+b1ˉxa2ˉyˉz1+b2ˉy)|+|a2yz1+b2ydz(a2ˉyˉz1+b2ˉydˉz)|r1|x(1xK1)ˉx(1ˉxK1)|+r2|y(1yK2)ˉy(1ˉyK2)|+2a1|xy1+b1xˉxˉy1+b1ˉx|+2a2|yz1+b2yˉyˉz1+b2ˉy|+d|zˉz|r1|xˉx|+r2|yˉy|+r1K1|x2ˉx2|+r2K2|y2ˉy2|+d|zˉz|+|xyˉxˉy+b1ˉxxyb1ˉxxˉy(1+b1x)(1+b1ˉx)|+|yzˉyˉz+b2ˉyyzb2ˉyyˉz(1+b2y)(1+b2ˉy)|r1|xˉx|+r2|yˉy|+r1K1|(x+ˉx)(xˉx)|+r2K2|(y+ˉy)(yˉy)|+d|zˉz|+|xyˉxˉy+b1xˉx(yˉy)|+|yzˉyˉz+b2yˉy(zˉz)|r1|xˉx|+r2|yˉy|+r1MK1|(xˉx)|+r2MK2|(yˉy)|+d|zˉz|+|xyxˉy+xˉyˉxˉy|+b1|xˉx||yˉy|+|yzyˉz+yˉzˉyˉz|+b2|yˉy||zˉz|(r1+r1MK1)|xˉx|+(r2+r2MK2)|yˉy|+d|zˉz|+M|yˉy|+M|xˉx|+b1M2|yˉy|+M|zˉz|+M|yˉy|+b2M2|zˉz|=(r1+r1MK1+M)|xˉx|+(r2+r2MK2+2M+b1M2)|yˉy|+(d+M+b2M2)|zˉz|LSˉS.

    where L=max{r1+r1MK1+M,r2+r2MK2+2M+b1M2,d+M+b2M2}, Based on Lemma 3, F(S) satisfies the Lipschitz condition with respect to S in Ω. According to the Banach fixed point theorem in [34], system (2.6) has a unique solution in Ω.

    Theorem 2. Set A={x,y,z)R3:0<x+y+z<K1(r1+v)24r1v+K2(r2+v)24r2v} as a positively invariant set of system (2.6), and the solutions are bounded.

    Proof: let g(t)g(x(t),y(t),z(t))=x(t)+y(t)+z(t),

    Dαtg(t)+vg(t)=(r1+v)x(t)r1K1x2(t)+(r2+v)y(t)r2K2y2(t)(dv)z(t)=r1K1(x(t)K1(r1+v)2r1)2r2K2(y(t)K2(r2+v)2r2)2(dv)z(t)+K1(r1+v)24r1+K2(r2+v)24r2,

    let

    u=K1(r1+v)24r1+K2(r2+v)24r2,v=d.

    According to the positive knowledge of all parameters and the nonnegativity of the solutions,

    Dαtg(t)+vg(t)u,

    we obtain

    g(t)uv+[g(0)uv]Eα(vtα),

    Since Eα(vtα)0, when g(0)uv, lim. According to the nonnegativity of the system (2.6), g(t)\geq 0 (\forall t \geq 0) ; hence, A = \{{x, y, z)\in \mathbb{R}}^{3} : 0 < x+y+z < \frac{K_{1}(r_{1}+v)^{2}}{4r_{1}v}+ \frac{K_{2}(r_{2}+v)^{2}}{4r_{2}v} \} is a positively invariant set of system (2.6), and the solutions are bounded.

    Let

    \left\{ \begin{array}{ll} r_{1}x(1-\frac{x}{K_{1}})-\frac{a_{1}xy}{1+b_{1}x} = 0, \\ r_{2}y(1-\frac{y}{K_{2}})+\frac{a_{1}xy}{1+b_{1}x}-\frac{a_{2}yz}{1+b_{2}y} = 0, \\ \frac{a_{2}yz}{1+b_{2}y}-dz = 0, \end{array} \right.

    Then, the equilibrium points are E_{0} = (0, 0, 0) , E_{1} = (K_{1}, 0, 0) , E_{2} = (0, K_{2}, 0) and E_{*} = (x_{*}, y_{*}, z_{*}) , where

    \begin{align} & x_{*} = \frac{b_{1}K_{1}-1}{2b_{1}}+\frac{\sqrt{b_{1}^{2}K_{1}^{2}r_{1}^{2}+2b_{1}K_{1}r_{1}^{2}-4a_{1}b_{1}K_{1}r_{1}y_{*}+y_{*}^{2}}}{2b_{1}r_{1}}, \\ & y_{*} = \frac{d}{a_{2}-b_{2}d}, \\ & z_{*} = \frac{a_{1}x_{*}(b_{2}y_{*}+1)}{a_{2}(b_{1}x_{*}+1)}-\frac{r_{2}(b_{2}y_{*}+1)(y_{*}-K_{2})}{a_{2}K_{2}}. \end{align}

    For system (2.6), the Jacobian matrix at the equilibrium point (x', y', z') is

    \begin{equation*} \begin{array}{lll} J(x', y', z') = \left[ \begin{array}{ccccccccc} r_{1}-\frac{2r_{1}x'}{K_{1}}-\frac{a_{1}d}{e_{1}e_{3}^{2}} & -e_{5} & 0 \\ e_{4} & r_{1}+e_{5}-\frac{a_{2}z'}{e_{2}}-\frac{2dr_{2}}{K_{2}e_{1}}+\frac{a_{2}b_{2}dz'}{e_{1}e_{2}^{2}} & -d \\ 0 & \frac{e_{1}^{2}z'}{a_{2}} & 0 \\ \end{array} \right], \end{array} \end{equation*}

    where e_{1} = a_{2}-b_{2}d , e_{2} = \frac{b_{2}d}{e_{1}}+1 , e_{3} = 1+b_{1}x' , e_{4} = \frac{2r_{1}x'}{K_{1}}+\frac{a_{1}d}{e_{1}e_{3}^{2}} , e_{5} = \frac{a_{1}x'}{e_{3}} .

    Theorem 3.3. For system (2.6), the equilibrium points E_{0} and E_{1} are saddle points.

    Proof: The Jacobian matrices evaluated at E_{0} and E_{1} are

    \begin{equation*} \begin{array}{lll} J(0, 0, 0) = \left[ \begin{array}{ccccccccc} r_{1} & 0 & 0 \\ 0 & r_{2} & 0 \\ 0 & 0 & -d \\ \end{array} \right], J(K_{1}, 0, 0) = \left[ \begin{array}{ccccccccc} -r_{1} & -\frac{a_{1}K_{1}}{b_{1}K_{1}+1} & 0 \\ 0 & r_{2}+\frac{a_{1}K_{1}}{b_{1}K_{1}+1} & 0 \\ 0 & 0 & -d \\ \end{array} \right], \end{array} \end{equation*}

    According to Lemma 2, when the eigenvalues are all real numbers and all negative, the equilibrium points are locally asymptotically stable.

    The eigenvalues of J(E_{0}) are \lambda_{01} = r_{1} , \lambda_{02} = r_{2} and \lambda_{03} = -d . The eigenvalues of J(E_{1}) are \lambda_{11} = -r_{1} , \lambda_{12} = r_{2}+\frac{a_{1}K_{1}}{b_{1}K_{1}+1} and \lambda_{13} = -d .

    Then, we have \lambda_{01}, \lambda_{02} > 0 , \lambda_{03}, \lambda_{11} < 0, and \lambda_{13} < 0 , so the equilibrium points E_{0} and E_{1} are saddle points.

    Theorem 4. For system (2.6), if r_{1} < a_{1}K_{2} and \frac{a_{2}K_{2}}{(b_{2}K_{2}+1)} < d , then the equilibrium point E_{2} = (0, K_{2}, 0) is locally asymptotically stable.

    Proof: The Jacobian matrix evaluated at E_{2} is

    \begin{equation*} \begin{array}{lll} J(0, K_{2}, 0) = \left[ \begin{array}{ccccccccc} r_{1}-a_{1}K_{2} & 0 & 0 \\ a_{1}K_{2} & -r_{2} & -\frac{a_{2}K_{2}}{b_{2}K_{2}+1} \\ 0 & 0 & \frac{a_{2}K_{2}}{b_{2}K_{2}+1}-d \\ \end{array} \right], \end{array} \end{equation*}

    The eigenvalues of J(E_{2}) are \lambda_{1} = r_{1}-a_{1}K_{2} , \lambda_{2} = -r_{2} and \lambda_{3} = \frac{a_{2}K_{2}}{b_{2}K_{2}+1}-d .

    Therefore, if r_{1} < a_{1}K_{2} and \frac{a_{2}K_{2}}{(b_{2}K_{2}+1)} < d , the equilibrium point E_{2} is locally asymptotically stable.

    The characteristic equation of equilibrium points E_{*} = (x_{*}, y_{*}, z_{*}) is given as

    \begin{equation} P(\lambda) = \lambda^{3}+A\lambda^{2}+B\lambda+C = 0, \end{equation} (3.2)

    where

    A = 2f_{4}-2r_{1}-e_{5}+f_{2}z_{*}+f_{1}de_{3}^{2}+f_{5}-\frac{f_{2}b_{2}dz_{*}}{e_{1}e_{2}} ,

    B = (B_{1}+B_{2}) ,

    B_{1} = e_{4}e_{5}+e_{5}r_{1}+r_{1}^{2}-2r_{1}f_{4}-f_{2}r_{1}z_{*}-2e_{5}f_{4}+\frac{e_{1}^{2}dz_{*}}{a_{2}} - f_{6}e_{5}-f_{6}r_{1}-2r_{1}f_{5} ,

    B_{2} = 2e_{3}^{2}f_{1}f_{5}+2f_{2}f_{4}z_{*}+a_{1}f_{3}e_{3}^{2}z_{*} +\frac{4dr_{2}f_{4}}{e_{1}k_{1}}+r_{1}f_{7}-f_{1}f_{7}de_{3}-2f_{4}f_{7} ,

    C = \frac{dz_{*}(a_{1}dK_{1}e_{3}^{2}-e_{1}K_{1}r_{1}+2e_{1}r_{1}x_{*})}{f_{1}K_{1}} ,

    where f_{1} = \frac{a_{1}}{e_{1}} , f_{2} = \frac{a_{2}}{e_{2}} , f_{3} = \frac{f_{2}d}{e_{1}} , f_{4} = \frac{r_{1}x_{*}}{K_{1}} , f_{5} = \frac{r_{2}d}{e_{1}K_{2}} , f_{6} = \frac{a_{1}de_{3}^{2}}{e_{1}} , f_{7} = \frac{b_{2}f_{3}z_{*}}{e_{2}} .

    For Eq. (3.2), define the discriminant as

    D(P) = 18ABC+(AB)^{2}-4CA^{2}-4B^{3}-27C^{2},

    With reference to the results of [35] and [36], we obtain the following fractional Routh-Hurwitz conditions:

    1. If D(P) > 0 , A > 0 , C > 0 , and AB-C > 0 , E_{*} is locally asymptotically stable.

    2. If D(P) < 0 and A\geq0 , B\geq0 , and C > 0 , when \alpha < \frac{2}{3} , E_{*} is locally asymptotically stable.

    3. If D(P) < 0 , A > 0 , B > 0 , and AB = C , then for all \alpha \in (0, 1) , E_{*} is locally asymptotically stable.

    Theorem 5. If D(P) < 0 , C > 0 and AB\neq C , then \alpha_{*}\in(0, 1) exists; when \alpha\in(0, \alpha_{*}) , E_{*} is locally asymptotically stable; when \alpha\in(\alpha_{*}, 1) , E_{*} is unstable. The system diverges at the critical value E_{*} .

    Proof: If D(P) < 0 , then the eigenvalues of Eq. (3.2) have one real root \lambda_{1} = a and two complex conjugate roots \lambda_{2, 3} = b\pm ci . Then, Eq. (3.2) can be written as

    \begin{equation} P(\lambda) = (\lambda-a)[\lambda-(b+ci)][\lambda-(b-ci)] = 0, \end{equation} (3.3)

    where A = -a-2b , B = b^{2}+c^{2}+2ab , C = -a(b^{2}+c^{2}) , c > 0 , a, b, c \in\mathbb{R} .

    From C > 0 , then a < 0 , and then |arg(\lambda_{1})| = \pi > \frac{\alpha\pi}{2} .

    From AB\neq C , then -a^{2}b+b(b^{2}+c^{2})\neq -2ab^{2} \Longrightarrow -2b[(a+b)^{2}+c^{2}]\neq0 \Longrightarrow b\neq0 and (a+b)^{2}+c^{2}\neq0 .

    Thus, we can obtain |arg(\lambda_{2, 3})| = |arctan(\frac{c}{b})| = arctan|\frac{c}{b}|\in(0, \frac{\pi}{2}) .

    Then, \alpha_{*}\in(0, 1) exists; when \alpha\in(0, \alpha_{*}) , \frac{\alpha\pi}{2} < arctan|\frac{c}{b}| , according to Lemma 2, E_{*} is locally asymptotically stable, and when \alpha\in(\alpha_{*}, 1) , \frac{\alpha\pi}{2} > arctan|\frac{c}{b}| , E_{*} is unstable.

    To study the asymptotic stability of system (2.6), three controllers will be added. The controller is proposed as follows: \mu_{1} = m_{1}x(x-x_{*}) , \mu_{2} = m_{2}y(y-y_{*}) , and \mu_{3} = m_{3}z(z-z_{*}) . where m_{1} , m_{2} and m_{3} represent negative feedback gains, which are defined as real numbers. Clearly, if m_{i} = 0 (i = 1, 2, 3) or x = x_{*} (y = y_{*}, z = z_{*}) , then \mu_{i} = 0 (i = 1, 2, 3) , so it will not change the equilibrium point of system (2.6).

    Controllers added into system (2.6) as follows

    \begin{equation} \left\{ \begin{array}{ll} D_{t}^{\alpha}x = r_{1}x(1-\frac{x}{K_{1}})-\frac{a_{1}xy}{1+b_{1}x}-m_{1}x(x-x_{*}), \\ D_{t}^{\alpha}y = r_{2}y(1-\frac{y}{K_{2}})+\frac{a_{1}xy}{1+b_{1}x}-\frac{a_{2}yz}{1+b_{2}y}-m_{2}y(y-y_{*}), \\ D_{t}^{\alpha}z = \frac{a_{2}yz}{1+b_{2}y}-dz-m_{3}z(z-z_{*}), \end{array} \right. \end{equation} (3.4)

    One gives a Lyapunov function as:

    V(x, y, z) = x-x_{*}-x_{*}\ln\frac{x}{x_{*}}+y-y_{*}-y_{*}\ln\frac{y}{y_{*}}+z-z_{*}-z_{*}\ln\frac{z}{z_{*}}.

    then,

    \begin{align} D_{t}^{\alpha}V & \leq \frac{x-x_{*}}{x}D^{\alpha}x+\frac{y-y_{*}}{y}D^{\alpha}y+\frac{z-z_{*}}{z}D^{\alpha}z \\ & = (x-x_{*})(r_{1}-r_{1}\frac{x}{K_{1}}-\frac{a_{1}y}{1+b_{1}x})-m_{1}(x-x_{*})^{2} \\ & +(y-y_{*})(r_{2}-r_{2}\frac{y}{K_{2}}+\frac{a_{1}x}{1+b_{1}x}-\frac{a_{2}z}{1+b_{2}y})-m_{2}(y-y_{*})^{2} \\ & +(z-z_{*})(\frac{a_{2}y}{1+b_{2}y}-d)-m_{3}(z-z_{*})^{2}. \end{align}

    Consider E_{*} to be the equilibrium point:

    \left\{ \begin{array}{ll} r_{1}-r_{1}\frac{x_{*}}{K_{1}}-\frac{a_{1}y_{*}}{1+b_{1}x_{*}} = 0, \\ r_{2}-r_{2}\frac{y_{*}}{K_{2}}+\frac{a_{1}x_{*}}{1+b_{1}x_{*}}-\frac{a_{2}z_{*}}{1+b_{2}y_{*}} = 0, \\ \frac{a_{2}y_{*}}{1+b_{2}y_{*}}-d = 0, \end{array} \right.

    According to Lemma 4, we can obtain

    \begin{align} D_{t}^{\alpha}V & \leq (x-x_{*})(r_{1}\frac{x_{*}}{K_{1}}+\frac{a_{1}y_{*}}{1+b_{1}x_{*}}-r_{1}\frac{x}{K_{1}}-\frac{a_{1}y}{1+b_{1}x})-m_{1}(x-x_{*})^{2} \\ & +(y-y_{*})(r_{2}\frac{y_{*}}{K_{2}}-\frac{a_{1}x_{*}}{1+b_{1}x_{*}}+\frac{a_{2}z_{*}}{1+b_{2}y_{*}}-r_{2}\frac{y}{K_{2}}+\frac{a_{1}x}{1+b_{1}x}-\frac{a_{2}z}{1+b_{2}y})-m_{2}(y-y_{*})^{2} \\ & +(z-z_{*})(\frac{a_{2}y}{1+b_{2}y}-\frac{a_{2}y_{*}}{1+b_{2}y_{*}})-m_{3}(z-z_{*})^{2} \\ & = a_{1}(x-x_{*})(\frac{y_{*}}{1+b_{1}x_{*}}-\frac{y}{1+b_{1}x})+a_{1}(y-y_{*})(\frac{x}{1+b_{1}x}-\frac{x_{*}}{1+b_{1}x_{*}}) \\ & +a_{2}(y-y_{*})(\frac{z_{*}}{1+b_{2}y_{*}}-\frac{z}{1+b_{2}y})+a_{2}(z-z_{*})(\frac{y}{1+b_{2}y}-\frac{y_{*}}{1+b_{2}y_{*}}) \\ & -(m_{1}+\frac{r_{1}}{K_{1}})(x-x_{*})^{2}-(m_{2}+\frac{r_{2}}{K_{2}})(y-y_{*})^{2}-m_{3}(z-z_{*})^{2} \\ & = a_{1}(x-x_{*})(\frac{y_{*}}{1+b_{1}x_{*}}-\frac{y_{*}}{1+b_{1}x}+\frac{y_{*}}{1+b_{1}x}-\frac{y}{1+b_{1}x}) \\ & +a_{1}(y-y_{*})(\frac{x}{1+b_{1}x}-\frac{x_{*}}{1+b_{1}x}+\frac{x_{*}}{1+b_{1}x}-\frac{x_{*}}{1+b_{1}x_{*}}) \\ & +a_{2}(y-y_{*})(\frac{z_{*}}{1+b_{2}y_{*}}-\frac{z_{*}}{1+b_{2}y}+\frac{z_{*}}{1+b_{2}y}-\frac{z}{1+b_{2}y}) \\ & +a_{2}(z-z_{*})(\frac{y}{1+b_{2}y}-\frac{y_{*}}{1+b_{2}y}+\frac{y_{*}}{1+b_{2}y}-\frac{y_{*}}{1+b_{2}y_{*}}) \\ & -(m_{1}+\frac{r_{1}}{K_{1}})(x-x_{*})^{2}-(m_{2}+\frac{r_{2}}{K_{2}})(y-y_{*})^{2}-m_{3}(z-z_{*})^{2} \\ & = a_{1}(x-x_{*})(\frac{b_{1}y_{*}(x-x_{*})}{(1+b_{1}x_{*})(1+b_{1}x)}+\frac{y_{*}-y}{1+b_{1}x}) +a_{1}(y-y_{*})(\frac{x-x_{*}}{1+b_{1}x}+\frac{b_{1}x_{*}(x_{*}-x)}{(1+b_{1}x_{*})(1+b_{1}x)}) \\ & +a_{2}(y-y_{*})(\frac{b_{2}z_{*}(y-y_{*})}{(1+b_{2}y_{*})(1+b_{2}y)}+\frac{z_{*}-z}{1+b_{2}y}) +a_{2}(z-z_{*})(\frac{y-y_{*}}{1+b_{2}y}+\frac{b_{2}y_{*}(y_{*}-y)}{(1+b_{2}y_{*})(1+b_{2}y)}) \\ & -(m_{1}+\frac{r_{1}}{K_{1}})(x-x_{*})^{2}-(m_{2}+\frac{r_{2}}{K_{2}})(y-y_{*})^{2}-m_{3}(z-z_{*})^{2} \\ & \leq \frac{a_{1}b_{1}y_{*}}{1+b_{1}x_{*}}(x-x_{*})^{2}+\frac{a_{2}b_{2}z_{*}}{1+b_{2}y_{*}}(y-y_{*})^{2} +\frac{a_{1}b_{1}x_{*}}{1+b_{1}x_{*}}(x-x_{*})(y_{*}-y)+\frac{a_{2}b_{2}y_{*}}{1+b_{2}y_{*}}(y-y_{*})(z_{*}-z) \\ & -(m_{1}+\frac{r_{1}}{K_{1}})(x-x_{*})^{2}-(m_{2}+\frac{r_{2}}{K_{2}})(y-y_{*})^{2}-m_{3}(z-z_{*})^{2} \\ & \leq\frac{a_{1}b_{1}x_{*}}{2(1+b_{1}x_{*})}((x-x_{*})^{2}+(y-y_{*})^{2})+\frac{a_{2}b_{2}y_{*}}{2(1+b_{2}y_{*})}((y-y_{*})^{2}+(z-z_{*})^{2}) \\ & +(\frac{a_{1}b_{1}y_{*}}{1+b_{1}x_{*}}-m_{1}-\frac{r_{1}}{K_{1}})(x-x_{*})^{2}+(\frac{a_{2}b_{2}z_{*}}{1+b_{2}y_{*}}-m_{2}-\frac{r_{2}}{K_{2}})(y-y_{*})^{2}-m_{3}(z-z_{*})^{2} \\ & = (\frac{a_{1}b_{1}(2y_{*}+x_{*})}{2(1+b_{1}x_{*})}-m_{1}-\frac{r_{1}}{K_{1}})(x-x_{*})^{2} +(\frac{a_{2}b_{2}y_{*}}{2(1+b_{2}y_{*})}-m_{3})(z-z_{*})^{2} \\ & +(\frac{a_{2}b_{2}(2z_{*}+y_{*})}{2(1+b_{2}y_{*})}+\frac{a_{1}b_{1}x_{*}}{2(1+b_{1}x_{*})}-m_{2}-\frac{r_{2}}{K_{2}})(y-y_{*})^{2}. \end{align}

    When m_{1}\geq\frac{a_{1}b_{1}(2y_{*}+x_{*})}{2(1+b_{1}x_{*})}-\frac{r_{1}}{K_{1}} , m_{2}\geq\frac{a_{2}b_{2}(2z_{*}+y_{*})}{2(1+b_{2}y_{*})}+\frac{a_{1}b_{1}x_{*}}{2(1+b_{1}x_{*})}-\frac{r_{2}}{K_{2}} , and m_{3}\geq\frac{a_{2}b_{2}y_{*}}{2(1+b_{2}y_{*})} , it follows that D^{\alpha}V\leq0 . We can show that the equilibrium point E_{*} is uniformly asymptotically stable.

    In this section, we use the Adams-Bashforth-Molton predictor-corrector algorithm numerical simulation. This method is described in detail in [37] and [38].

    Example 1. In system (2.6), let r_{1} = 1 , r_{2} = 0.6 , K_{1} = 50 , K_{2} = 10 , a_{1} = 1 , a_{2} = 0.6 , b_{1} = 5 , b_{2} = 0.01 and d = 0.5 . System (2.6) has a positive equilibrium point E_{*} = (49.8479, 0.8403, 1.2597) . According to Theorem 3.5, when \alpha = 1 , \alpha = 0.9 , \alpha = 0.8 , and E_{*} is locally asymptotically stable, it can be seen from Figure 1 that the order \alpha will affect the speed at which the system converges to the equilibrium point. The relevant results are shown in Figure 1.

    Figure 1.  Stability of the equilibrium E_{*} for \alpha = 1 , \alpha = 0.9 and \alpha = 0.8 .

    Example 2. In system (2.6), let r_{1} = 1 , r_{2} = 0.6 , K_{1} = 50 , K_{2} = 30 , a_{1} = 1 , a_{2} = 0.6 , b_{1} = 5 , b_{2} = 0.2 and d = 0.2 . System (2.6) has a positive equilibrium point E_{*} = (49.9382, 0.3571, 1.4158) . It follows from Theorem 3.5 that system (2.6) has a bifurcation at \alpha_{*} . When \alpha = 0.95 and \alpha = 0.8 , E_{*} is locally asymptotically stable, and when \alpha = 0.98 , E_{*} is unstable. The relevant results are shown in Figure 2.

    Figure 2.  Stability of the equilibrium E_{*} for \alpha = 0.98 , \alpha = 0.95 and \alpha = 0.8 .

    Example 3. To verify the sensitivity of the system (2.6) to initial conditions and other parameters, according to the method in [39], apply the positive Euler format to transform the differential model into the following discrete form:

    \begin{equation} \left\{ \begin{array}{ll} x_{t+1} = x_{t}+\delta(r_{1}x_{t}(1-\frac{x_{t}}{K_{1}})-\frac{a_{1}x_{t}y_{t}}{1+b_{1}x_{t}}), \\ y_{t+1} = y_{t}+\delta(r_{2}y_{t}(1-\frac{y_{t}}{K_{2}})+\frac{a_{1}x_{t}y_{t}}{1+b_{1}x_{t}}-\frac{a_{2}y_{t}z_{t}}{1+b_{2}y_{t}}), \\ z_{t+1} = z_{t}+\delta(\frac{a_{2}y_{t}z_{t}}{1+b_{2}y_{t}}-dz_{t}), \end{array} \right. \end{equation} (4.1)

    where \delta is the time step size. We use the parameters of Example 1 to study Lyapunov exponents. Figure 3 shows that system (2.6) is in a stable state and is less sensitive to initial conditions.

    Figure 3.  Spectrum of Lyapunov exponent of system (2.6).

    This paper studies a new fractional-order food chain model with a Holling type-II functional response. First, the existence, uniqueness, nonnegativity and boundedness of the solution of the model are discussed. Second, the local stability of each equilibrium point is discussed. Third, controllers \mu_{1} = m_{1}x(x-x_{*}) , \mu_{2} = m_{2}y(y-y_{*}) and \mu_{3} = m_{3}z(z-z_{*}) are proposed and added to the system. Using the Lyapunov method, sufficient conditions for the positive equilibrium point to reach the global uniformly asymptotically stable state are obtained. Finally, we use numerical simulations to verify the theoretical results.

    This work was supported by the Shandong University of Science and Technology Research Fund (2018 TDJH101).

    The author declares no conflicts of interest in this paper.



    [1] S. Sharma, K. Chen and A. Sheth, Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems, IEEE Int. Comput., 22 (2018), 42–51.
    [2] M. Elhoseny, G. Ram´ ırez-González, O. M. Abu-Elnasr, et al., Secure medical data transmission model for IoT-based healthcare systems, IEEE Access, 6 (2018), 20596–20608.
    [3] T. Wu, F. Wu, J. M. Redouté, et al., An autonomous wireless body area network implementation towards IoT connected healthcare applications, IEEE Access, 5 (2017), 11413–11422.
    [4] F. Sebbak and F. Benhammadi, Majority-consensus fusion approach for elderly IoT-based health- care applications, Ann. Telecommun., 72 (2017), 157–171.
    [5] U. Satija, B. Ramkumar and M. S. Manikandan, Real-time signal quality-aware ECG telemetry system for IoT-based health care monitoring, IEEE Internet Things J., 4 (2017), 815–823.
    [6] G. R. Blakley, Safeguarding cryptographic keys, in Proc. AFIPS Nat. Comput. Conf. (NCC), New York, NY, USA, (1979), 313–317.
    [7] A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613.
    [8] M. Ito, A. Saito and T. Nishizeki, Secret sharing scheme realizing general access structure, in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Tokyo, Japan, (1987), 99–102.
    [9] J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, in Proc. Conf. Theory and Appl. of Cryptography (CRYPTO), Santa Barbara, CA, USA, (1988), 27–35.
    [10] E. F. Brickell, Some ideal secret sharing schemes, in Proc. Workshop Theory and Appl. of Cryptographic Techn. (EUROCRYPT), Houthalen, Belgium, (1989), 468–475.
    [11] E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology, 4 (1991), 123–134.
    [12] A. Beimel and B. Chor., Universally ideal secret-sharing schemes, IEEE Trans. Inf. Theory, 40 (1994), 786–794.
    [13] B. Chor, S. Goldwasser and S. Micali, et al., Verifiable secret sharing and achieving simultaneity in the presence of faults, in Proc. Ann. Symp. Found. Comput. Sci. (SFCS), Portland, OR, USA, (1985), 383–395.
    [14] P. Feldman, A Practical scheme for non-interactive verifiable secret sharing, in Proc. Ann. Symp. Found. Comput. Sci. (SFCS), Los Angeles, CA, USA, (1987), 427–438.
    [15] T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, in Proc. Ann. ACM Symp. Theory of Comput. (STOC), Seattle, WA, USA, (1989), 73–85.
    [16] M. Tompa and H. Woll, How to share a secret with cheaters, J. Cryptol., 1 (1989), 133–138.
    [17] T. P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, in Proc. Annl. Int. Cryptology Cof. (CRYPTO), Santa Barbara, CA, USA, (1991), 129–140.
    [18] M. Stadler, Publicly verifiable secret sharing, in Proc. Int. Conf. Theory and Appl. of Crypto- graphic Techn. (EUROCRYPT), Saragossa, Spain, (1996), 190–199.
    [19] R. Cramer, I. Damgård and U. Maurer, General secure multi-party computation from any linear secret-sharing scheme, in Proc. Int. Conf. Theory and Appl. of Cryptographic Techn. (EURO- CRYPT), Bruges, Belgium, (2000), 316–334.
    [20] M. Naor and A. Shamir, Visual cryptography, in Proc. Workshop Theory and Appl. of Crypto- graphic Techn. (EUROCRYPT), Perugia, Italy, (1994), 1–12.
    [21] C. Blundo, A. D. Santis and M. Naor, Visual cryptography for grey level images, Inf. Process. Lett., 75 (2000), 255–259.
    [22] Y. C. Hou, Visual cryptography for color images, Pattern Recognit., 36 (2003), 1619–1629. 23. Z. Zhou, G. R. Arce and G. D. Crescenzo, Halftone visual cryptography, IEEE Trans. Image Process, 15 (2006), 2441–2453.
    [23] 24. I. Ingemarsson and G. J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutually trusted party, in Proc. Workshop Theory and Appl. of Cryptographic Techn. (EUROCRYPT), Aarhus, Denmark, (1994), 266–282.
    [24] 25. W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Inf. Theory, 22 (1976), 644–654.
    [25] 26. N. Koblitz, Elliptic curve cryptosystems, Math. Comput., 48 (1987), 203–209.
    [26] 27. R. L. Rivest, L. Adleman and M. L. Dertouzos, On data banks and privacy homomorphisms, in Foundations of Secure Computation (eds. R. J. Lipton, D. P. Dobkin, and A. K. Jones), Academic Press, (1978), 169–180.
    [27] 28. R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21 (1978), 120–126.
    [28] 29. T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory, 4 (1985), 469–472.
    [29] 30. T. Okamoto and S. Uchiyama, A new public-key cryptosystem as secure as factoring, in Proc. Int. Conf. Theory and Appl. of Cryptographic Techn. (EUROCRYPT), Espoo, Finland, (1998), 308–318.
    [30] 31. I. Damgård and M. Jurik, A generalisation, a simplication and some applications of Paillier's probabilistic public-key system, in Proc. Int. Workshop Practice and Theory in Public Key Cryp- tography (PKC), Cheju Island, Korea, (2001), 119–136.
    [31] 32. P. Paillier, Public-key cryptosystems based on composite degree residuosity slasses, in Proc. Int. Conf. Theory and Appl. of Cryptographic Techn. (EUROCRYPT), Prague, Czech Republic, (1999), 223–238.
    [32] 33. C. C. Chang and C. T. Li, Secure secret sharing in the cloud, in Proc. IEEE Int. Symp. Multimedia (ISM), Taichung, Taiwan, (2017), 358–361.
    [33] 34. L. Csanky, Fast parallel matrix inversion algorithms, SIAM J. Comput., 5 (1976), 618–623.
    [34] 35. V. Strassen, Gaussian elimination is not optimal, Numerische Mathematik, 13 (1969), 354–356.
    [35] 36. D. Coppersmith and S. Winograd, Matrix multiplication via arithmetic progressions, J. Symbolic Comput., 9 (1990), 251–280.
    [36] 37. F. Le Gall, Powers of tensors and fast matrix multiplication, in Proc. Int. Symp. Symbolic and Algebraic Comput. (ISSAC), Kobe, Japan, (2014), 296–303.
  • This article has been cited by:

    1. Jinghui Lin, Meifang Li, Shijie Chen, Lihong Weng, Zhiyong He, Efficacy and Safety of First-Generation EGFR-TKIs Combined with Chemotherapy for Treatment-Naïve Advanced Non-Small-Cell Lung Cancer Patients Harboring Sensitive EGFR Mutations: A Single-Center, Open-Label, Single-Arm, Phase II Clinical Trial, 2021, Volume 14, 1178-7031, 2557, 10.2147/JIR.S313056
    2. Shizhe Li, He Zhang, Ting Chen, Xiaowen Zhang, Guanning Shang, Current treatment and novel insights regarding ROS1‐targeted therapy in malignant tumors, 2024, 13, 2045-7634, 10.1002/cam4.7201
    3. Hakan Şat Bozcuk, Leyla Sert, Muhammet Ali Kaplan, Ali Murat Tatlı, Mustafa Karaca, Harun Muğlu, Ahmet Bilici, Bilge Şah Kılıçtaş, Mehmet Artaç, Pınar Erel, Perran Fulden Yumuk, Burak Bilgin, Mehmet Ali Nahit Şendur, Saadettin Kılıçkap, Hakan Taban, Sevinç Ballı, Ahmet Demirkazık, Fatma Akdağ, İlhan Hacıbekiroğlu, Halil Göksel Güzel, Murat Koçer, Pınar Gürsoy, Bahadır Köylü, Fatih Selçukbiricik, Gökhan Karakaya, Mustafa Serkan Alemdar, Enhancing Treatment Decisions for Advanced Non-Small Cell Lung Cancer with Epidermal Growth Factor Receptor Mutations: A Reinforcement Learning Approach, 2025, 17, 2072-6694, 233, 10.3390/cancers17020233
    4. Pakorn Prakaikietikul, Pattraporn Tajarenmuang, Phumiphat Losuriya, Natee Ina, Thanika Ketpueak, Thanat Kanthawang, Mirosława Püsküllüoğlu, Non-cancerous CT findings as predictors of survival outcome in advanced non-small cell lung cancer patients treated with first-generation EGFR-TKIs, 2025, 20, 1932-6203, e0313577, 10.1371/journal.pone.0313577
    5. Die Zhang, Jumei Zhao, Yue Yang, Qiangfang Dai, Ning Zhang, Zhikuan Mi, Qianqian Hu, Xiaolong Liu, Fourth-generation EGFR-TKI to overcome C797S mutation: past, present, and future, 2025, 40, 1475-6366, 10.1080/14756366.2025.2481392
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(5624) PDF downloads(689) Cited by(28)

Figures and Tables

Figures(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog